ingress and egress filtering

ingress and egress filtering
входная и выходная фильтрация
контроль трафика на входных и выходных узлах сети для удаления пакетов с фальшивыми IP-адресами - метод защиты от хакерских нападений
см. тж. filtering

Англо-русский толковый словарь терминов и сокращений по ВТ, Интернету и программированию. . 1998-2007.

Игры ⚽ Нужно сделать НИР?

Смотреть что такое "ingress and egress filtering" в других словарях:

  • Egress filtering — In computer networking, egress filtering is a method of filtering electronic traffic that contributes to the security of a network and therefore makes it less prone to attacks from crackers.This method of filtering prevents crackers from using a… …   Wikipedia

  • Ingress filtering — In computer networking, ingress filtering is a technique used to make sure that incoming packets are actually from the networks that they claim to be from. Contents 1 Problem 2 Solution 3 Networks 4 See also …   Wikipedia

  • Ingress — may refer to:*The act of entering. Antonym of egress. *A type of noise typically encountered when using coaxial cable *Ingress Bell (1834 1913), an English architect *Ingress filtering, a computer network packet filtering technique *Ingress… …   Wikipedia

  • входная и выходная фильтрация — Метод защиты от хакерских атак путем фильтрации фальшивых IP адресов на входе и выходе узла сети. [] Тематики информационные технологии в целом EN ingress and egress filtering …   Справочник технического переводчика

  • IP traceback — is a name given to any method for reliably determining the origin of a packet on the Internet. The datagram nature of the Internet makes it difficult to determine the originating host of a packet – the source id supplied in an IP packet can be… …   Wikipedia

  • Synchronous optical networking — (SONET) and Synchronous Digital Hierarchy (SDH), are two closely related multiplexing protocols for transferring multiple digital bit streams using lasers or light emitting diodes (LEDs) over the same optical fiber. The method was developed to… …   Wikipedia

  • IP address spoofing — In computer networking, the term IP (Internet Protocol) address spoofing refers to the creation of IP packets with a forged (spoofed) source IP address with the purpose of concealing the identity of the sender or impersonating another computing… …   Wikipedia

  • Comparison of firewalls — The following tables compare different aspects of a number of firewalls, starting from simple home firewalls up to the most sophisticated Enterprise firewalls. Contents 1 Firewall software 2 Firewall rule set basic filtering features comparison 3 …   Wikipedia

  • Network Monitoring Interface Card — A network monitoring interface card or NMIC is similar to a network card (NIC). However, unlike a standard network card, an NMIC is designed to passively (and silently) listen on a network. At a functional level, an NMIC may differ from a NIC, in …   Wikipedia

  • Radio transmitter design — In plate modulation systems the voltage delivered to the stage is changed. As the power output available is a function of the supply voltage, the output power is modulated. This can be done using a transformer to alter the anode (plate) voltage.… …   Wikipedia

  • Network calculus — is a theoretical framework for analysing performance guarantees in computer networks. As traffic flows through a network it is subject to constraints imposed by the system components, for example: link capacity traffic shapers (leaky buckets)… …   Wikipedia

Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»